PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into Applications·3 min read·Mar 4, 2024----
PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…·5 min read·Apr 22, 2019--3--3
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceWill The Last Human Researcher Please Close the Door After Them?The peer review process in science and technology is the bedrock of research. Without it, anyone could publish any old rubbish. We see this…3 min read·1 day ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceMaking The Spam Bots WorkSpamming is still a major problem on email and bulletin boards. Why? Because it is free to post things and does not require a good deal of…3 min read·2 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceNostr Identification Protocol-06 (NIP-06)Nostr (Notes and Other Stuff Transmitted by Relays) uses clients and relays, and where users run clients, and where anyone can be a relay…2 min read·3 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceNostr: Notes and Other Stuff Transmitted by RelaysJust like in 1984, our world of communications is often controlled by centralised authorities. This can, of course, be a good thing, as it…4 min read·3 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceQuadratic Roots for a Modulo of a Prime of 5 (mod 8)Public key encryption has a range of number theoretic problems, of which there is no actual proof of security [1]:4 min read·3 days ago--1--1
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAre Your Lucky?Read Euler, Read Euler. The master of us all. — Pierre−Simon Laplace6 min read·4 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIntractable Problems in Public Key: SQUARINGPublic key encrytion has a range of number theoretic problems, of which there is no actual proof of security [1]:4 min read·5 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Pohlig-Hellman AttackCurve 25519 is a little bit of a problem — in that it has a subgroup with a co-factor of 8. This means that we have an eighth of the total…4 min read·May 1, 2024----